Daniel Genkin

25 posts

Daniel Genkin banner
Daniel Genkin

Daniel Genkin

@DanielGenkin

Associate Professor at Georgia Tech. Security, systems, side channels, cryptography.

Atlanta, GA Katılım Ağustos 2018
174 Takip Edilen816 Takipçiler
Daniel Genkin
Daniel Genkin@DanielGenkin·
2/2 Its legacy however lives on, being the first demonstration of an end-to-end TDX break. Other CPUs have already risen to take its role, with the server being operational by simply plopping a fresh CPU from the tray. This one however is going to a cherished place on the shelf.
Daniel Genkin tweet media
English
0
2
36
4.4K
Daniel Genkin
Daniel Genkin@DanielGenkin·
1/2 After two weeks of TEE.fail being public (and additional 6+ month of private disclosure) Intel has finally revoked one of several CPUs used for @Teedotfail. This means that the Xeon chip below has made the ultimate sacrifice and will never run SGX or TDX again.
Daniel Genkin tweet mediaDaniel Genkin tweet media
English
3
15
183
29.5K
Aniket Kate
Aniket Kate@aniketpkate·
Good point. While this decryption process can be made distributed, it is important to understand that the distributed FHE decryption is not scalable, especially for a verifiable decryption process. Going for decentralization beyond 20 nodes will be a challenge. MPC such as Velox (eprint.iacr.org/2025/1630) can scale much better.
Ian Miers@secparam

There's no such thing as Fully-Homomorphic Decryption. Anytime you see a system using FHE to compute on your sensitive data, remember: someone has the key. If its not you, do you trust them?

English
4
2
64
15K
Daniel Genkin
Daniel Genkin@DanielGenkin·
More interposer fun, this time with DDR5 memory. Breaking TDX, SGX, SEV and even Nvidia TEEs. Checkout our work at TEE.fail, and get a personally-signed Intel attestation report at @TEEdotFail.
Daniel Genkin tweet mediaDaniel Genkin tweet media
English
45
84
350
137.3K
Daniel Genkin
Daniel Genkin@DanielGenkin·
Want to know what happens when commercial TEEs meet improvised DRAM memory interposers? SGX mayhem including attestation key extraction. Please DO try that at home😉. Check out our work at wiretap.fail
Daniel Genkin tweet media
English
7
61
209
58.7K
Daniel Genkin
Daniel Genkin@DanielGenkin·
Have an Apple device from the last few years? We have a new side channel attack for you. Checkout our work at predictors.fail Joint work with Jason Kim, Jalen Chuang and Yuval Yarom (@yuvalyarom). Could not have asked for a better team!
Daniel Genkin tweet media
English
1
28
78
9.7K
Daniel Genkin
Daniel Genkin@DanielGenkin·
Microarchitectural unboxing: check out our new demo for breaking two factor authentication using iLeakage. Yes you heard it, speculative execution attacks on Apple’s M3 Macs and latest Safari that defeat Facebook’s 2FA over SMS. ileakage.com
Daniel Genkin tweet mediaDaniel Genkin tweet media
English
0
14
35
7.2K
Daniel Genkin retweetledi
Adam Doupé
Adam Doupé@adamdoupe·
Goodbye WOOT the Workshop, hello WOOT the Conference! Excited to be a part of this legacy and this new beginning.
USENIX WOOT Conference on Offensive Technologies@wootsecurity

WOOT! Big news! Starting 2024 WOOT will be @USENIX WOOT Conference on Offensive Technologies! WOOT '24 will be on August 12-13 2024, colocated with USENIX Security WOOT '24 will be co-chaired by @noopwafel (@intel) and @adamdoupe (@uarizona) usenix.org/conference/woo…

English
1
8
74
6.8K